IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed    Add to Google    Add to My Yahoo!
IM (Identity Management) Reports
 
A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Oracle Identity Manager vs. Tivoli Identity Manager: IAMs fight for the win
sponsored by IT Central Station
ESSENTIAL GUIDE: With the amount of identity and access management solutions out there, sometimes it can be hard to decipher fact from fiction when it comes to reading user reviews. Find out what verified IT experts say about IAM products in this IT Central Station guide.
Posted: 05 Dec 2014 | Published: 05 Dec 2014


Solidifying Cloud Security
sponsored by Ping Identity Corporation
VIDEO: This video will show you how Ping Identity's partner Fishnet Security enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency.
Posted: 03 Feb 2015 | Premiered: 21 Jan 2013

Ping Identity Corporation

Tame Mobile and Cloud Security Risks by Becoming an IdP
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Safeguarding Mobile, Cloud, and Social Access
sponsored by IBM
WHITE PAPER: In this white paper, explore a number of strategies and solutions for protecting your data from malicious attacks on new access channels.
Posted: 02 Mar 2015 | Published: 17 Sep 2014

IBM

Cloud and BYOD: So Happy Together
sponsored by SearchCloudComputing.com
VIRTUAL ENVIRONMENT: Getting cloud computing and mobile computing to coexist in ways that allow workers to be safely productive while not at their desks is a challenge. To succeed, IT admins must contend with device management, content management, file sharing in the cloud and security.
Posted: 30 Apr 2014 | Premiered: 08 May 2014

SearchCloudComputing.com

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Who, What, Where? How the Cloud Complicates Identity Management
sponsored by SearchExchange.com
EBOOK: In the era of consumerization, cloud computing and heightened security worries, running an effective identity management program is no small task.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

SearchExchange.com

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement